๐Ÿงช Mobile Forensic Simulation Toolkit

Explore a set of behavioral forensic case studies developed to simulate real-world criminal patterns using mobile device logs, location trails, and app usage analysis.

๐Ÿš“ Drug Trafficking Behavior

High call frequency, GPS clustering in red zones, encrypted chats. CSV-based simulation analyzed using SIEM dashboards.

View Logs

๐Ÿ’ธ Financial Fraud Pattern

Sudden app access spikes, suspicious banking terms, VPN activity, and flagged transaction keywords.

View Logs

๐Ÿ” Insider Threat Detection

Privileged access at odd hours, internal data sharing, and device activity logs matched with user profiles.

View Logs

๐ŸŽญ Social Engineering Exploit

SMS phishing, impersonation attempts, response tracking, and metadata anomalies.

View Logs

๐Ÿ‘ค Stalking & Harassment Trail

Repeated GPS overlap, app usage timing, frequent SMS with flagged keywords.

View Logs

๐ŸŽฏ Fake HR Recruitment Scam

Messaging on Telegram, WhatsApp, frequent resume uploads, Bitcoin wallet detections in logs.

View Logs